Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

ClickFix in action: how fake captcha can encrypt an entire company

0
Medium
Published: Thu Feb 19 2026 (02/19/2026, 15:26:28 UTC)
Source: AlienVault OTX General

Description

The ClickFix malware campaign targets organizations using fake CAPTCHA prompts to trick users into executing malicious code via Windows+R shortcuts. It involves two malware families, Latrodectus (v2. 3) and Supper, which establish persistence, communicate with C2 servers, and potentially encrypt company data. The attack leverages social engineering and side-loading techniques to evade detection and maintain long-term access. Indicators of compromise include specific C2 IP addresses and file hashes. Employee awareness and active monitoring for anomalous behaviors are critical to defense. The threat is medium severity but can cause significant disruption if successful. No known public exploits exist yet, but the complexity and stealth of the malware families pose a substantial risk. Organizations should focus on endpoint security, application control, and network monitoring to mitigate this threat. The most affected regions are likely those with significant Polish business presence and similar enterprise environments.

AI-Powered Analysis

AILast updated: 02/19/2026, 18:16:54 UTC

Technical Analysis

This threat involves a malware campaign targeting a large Polish organization using a social engineering technique involving fake CAPTCHA prompts. Users are deceived into running malicious code through the Windows+R shortcut, which is an uncommon but effective infection vector. The malware campaign includes two main families: Latrodectus version 2.3 and Supper. Latrodectus is known for its sophisticated persistence mechanisms, including side-loading legitimate DLLs to evade detection, and uses advanced techniques such as process injection (T1055) and credential dumping (T1003). Supper complements Latrodectus by providing additional capabilities such as ransomware-like encryption of company data. Both malware families communicate with command and control (C2) servers using encrypted protocols (T1071.001) to receive commands and exfiltrate data. The campaign employs obfuscation (T1027) and masquerading (T1036.004) to avoid signature-based detection. Persistence is maintained through scheduled tasks (T1053.005) and registry modifications. The report includes technical indicators like C2 IP addresses and file hashes, which can be used for detection and response. The attack chain demonstrates a blend of social engineering, malware sophistication, and stealthy communication, making it a complex threat to detect and mitigate. The absence of known public exploits suggests this is a targeted campaign rather than widespread opportunistic malware. The report emphasizes the importance of employee training to recognize social engineering attempts and the need for continuous monitoring of unusual system and network activities to detect early signs of compromise.

Potential Impact

If successful, this malware campaign can lead to significant operational disruption through encryption of critical company data, effectively amounting to a ransomware attack. The compromise of credentials and persistent access allows attackers to move laterally within the network, increasing the risk of data exfiltration and further sabotage. Organizations may face downtime, loss of sensitive information, reputational damage, and financial costs related to incident response and recovery. The use of sophisticated evasion techniques complicates detection and remediation, potentially prolonging the attack lifecycle. Given the targeted nature and the use of social engineering, organizations with large user bases and complex IT environments are particularly at risk. The impact extends beyond confidentiality to integrity and availability of systems and data, making this a multi-dimensional threat. Failure to detect early signs may result in widespread encryption and operational paralysis. The medium severity rating reflects the balance between the attack complexity and the need for user interaction, but the potential consequences warrant serious attention.

Mitigation Recommendations

To mitigate this threat, organizations should implement a multi-layered defense strategy. First, conduct targeted employee training focused on recognizing social engineering tactics, especially fake CAPTCHA prompts and suspicious use of Windows+R commands. Deploy application whitelisting and restrict execution of unauthorized scripts or binaries launched via shortcut keys. Enhance endpoint detection and response (EDR) capabilities to identify behaviors such as side-loading, process injection, and unusual scheduled tasks. Network monitoring should include anomaly detection for encrypted C2 communications and unusual outbound connections to known malicious IP addresses. Regularly update and patch systems to reduce the attack surface, even though no specific patches are noted for this malware. Implement strict credential management policies and monitor for signs of credential dumping. Use threat intelligence feeds to incorporate the provided indicators of compromise into security tools for proactive detection. Conduct regular backups with offline storage to enable recovery from ransomware-like encryption. Finally, establish incident response plans that include rapid isolation and forensic analysis to contain infections early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://cert.pl/posts/2026/02/fake-captcha-in-action"]
Adversary
null
Pulse Id
69972ba4edeee60b22933086
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash16afa928cd820a572bd47e798f481c46
hashe6133838440afc64ce9722343a1cb297
hashee901ff4ad552d0f8dc8fd5837ace5ab
hashfd817202314d4067c2dc9c51d98f0268
hash273962821f14982ead6c10823587fd39e89cf2fc
hash699cf845d7320c0a7c1407dbf8f73c9fdfb5c754
hashb5710067c36447759b82593200f7374760d71571
hashd1eccb3d907f0cd7e52d502b340624d5dc98f8dc
hash21b953dc06933a69bcb2e0ea2839b47288fc8f577e183c95a13fc3905061b4e6
hash2528df60e55f210a6396dd7740d76afe30d5e9e8684a5b8a02a63bdcb5041bfc
hash6673794376681c48ce4981b42e9293eee010d60ef6b100a3866c0abd571ea648
hashaf45a728552ccfdcd9435c40ace60a9354d7c1b52abf507a2f1cb371dada4fde
hashb7f8750851e70ec755343d322d7d81ea0fc1b12d4a1ab6a60e7c8605df4cd6a5
hashbe5bcdfc0dbe204001b071e8270bd6856ce6841c43338d8db914e045147b0e77
hash3d56542349180e144aa17230e99b7eb4a29b97ea

Ip

ValueDescriptionCopy
ip110.199.19.162
ip171.130.169.141
ip185.233.166.27
ip27.166.233.185
ip85.239.54.130

Url

ValueDescriptionCopy
urlhttp://jzluw.com/cdn-dynmedia-1.microsoft.com/is/n03ufh3k003jdhkg99fhhas/is/content/
urlhttp://naintn.com/amazoncdn.com/oeiich37874cj30dkk43885j10vj38h38jd/nrs/opn/ca/
urlhttps://fadoklismokley.com/work/
urlhttps://fadoklismokley.com/work/?counter=0&type=1&guid=3B7FFFF7F331576B6FA3479BDF43&os=6&arch=1&username=JohnDoe&group=2201209746&ver=2.3&up=7&direction=fadoklismokley.com
urlhttps://gasrobariokley.com/work/
urlhttps://gasrobariokley.com/work/?counter=0&type=1&guid=3B7FFFF7F331576B6FA3479BDF43&os=6&arch=1&username=JohnDoe&group=2201209746&ver=2.3&up=7&direction=gasrobariokley.com

Domain

ValueDescriptionCopy
domainfadoklismokley.com
domaingasrobariokley.com
domainjzluw.com
domainnaintn.com

Threat ID: 69974fe8d7880ec89b065be4

Added to database: 2/19/2026, 6:01:12 PM

Last enriched: 2/19/2026, 6:16:54 PM

Last updated: 2/19/2026, 8:52:08 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats